Software vulnerability prioritization using vulnerability description.
Ruchi SharmaRitu SibalSangeeta SabharwalPublished in: Int. J. Syst. Assur. Eng. Manag. (2021)
Keyphrases
- security vulnerabilities
- software development
- case study
- high level
- software tools
- neural network
- security risks
- source code
- computer systems
- data sets
- software maintenance
- software architecture
- attack graphs
- regression testing
- software application
- risk assessment
- personal computer
- database systems
- e learning
- databases